Page(s) : 1 ... 105 106 107 108 109 110 111 112 113 114 [115] 116 117 118 119 120 121 122 123 124 125 ... | Result(s) : 43231 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
9.8 | 2024-09-13 | CVE-2024-44430 | cve | SQL Injection vulnerability in Best Free Law Office Management Software-v1.0 allows an attacker to execute arbitrary code and obtain sensitive information via a crafted payload ... |
9.8 | 2024-09-13 | CVE-2024-46044 | cve | CH22 V1.0.0.6(468) has a stack overflow vulnerability located in the fromqossetting function. |
9.8 | 2024-09-13 | CVE-2024-46045 | cve | Tenda CH22 V1.0.0.6(468) has a stack overflow vulnerability located in the frmL7PlotForm function. |
9.8 | 2024-09-13 | CVE-2024-46046 | cve | Tenda FH451 v1.0.0.9 has a stack overflow vulnerability located in the RouteStatic function. |
9.8 | 2024-09-13 | CVE-2024-46048 | cve | Tenda FH451 v1.0.0.9 has a command injection vulnerability in the formexeCommand function i |
9.8 | 2024-09-13 | CVE-2024-46049 | cve | Tenda O6 V3.0 firmware V1.0.0.7(2054) contains a stack overflow vulnerability in the formexeCommand function. |
9.8 | 2024-09-13 | CVE-2024-6656 | cve | Use of Hard-coded Credentials vulnerability in TNB Mobile Solutions Cockpit Software allows Read Sensitive Strings Within an Executable.This issue affects Cockpit Software: befo... |
9.8 | 2024-09-13 | CVE-2024-8762 | cve | A vulnerability was found in code-projects Crud Operation System 1.0. It has been classified as critical. This affects an unknown part of the file /updatedata.php. The manipulat... |
9.8 | 2024-09-12 | CVE-2024-8695 | cve | A remote code execution (RCE) vulnerability via crafted extension description/changelog could be abused by a malicious extension in Docker Desktop before 4.34.2. |
9.8 | 2024-09-12 | CVE-2024-8696 | cve | A remote code execution (RCE) vulnerability via crafted extension publisher-url/additional-urls could be abused by a malicious extension in Docker Desktop before 4.34.2. |
9.1 | 2024-09-12 | CVE-2024-7960 | cve | The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view sensitive information and change settings. The vulnerability exists due to h... |
9.8 | 2024-09-12 | CVE-2024-7961 | cve | A path traversal vulnerability exists in the Rockwell Automation affected product. If exploited, the threat actor could upload arbitrary files to the server that could result i... |
9.8 | 2024-09-12 | CVE-2024-45824 | cve | CVE-2024-45824 IMPACT A remote code vulnerability exists in the affected products. The vulnerability occurs when chained with Path Traversal, Command Injection, and XSS Vulne... |
9.8 | 2024-09-12 | CVE-2024-45823 | cve | CVE-2024-45823 IMPACT An authentication bypass vulnerability exists in the affected product. The vulnerability exists due to shared secrets across accounts and could allow a ... |
9.1 | 2024-09-12 | CVE-2024-2743 | cve | An issue was discovered in GitLab-EE starting with version 13.3 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2 that would allow an attacker to modify an on-demand DAS... |
9.1 | 2024-09-12 | CVE-2021-22533 | cve | Possible Insertion of Sensitive Information into Log File Vulnerability in eDirectory has been discovered in OpenText™ eDirectory 9.2.4.0000. |
9.8 | 2024-09-12 | CVE-2021-38132 | cve | Possible External Service Interaction attack in eDirectory has been discovered in OpenText™ eDirectory. This impact all version before 9.2.6.0000. |
9.8 | 2024-09-12 | CVE-2024-29847 | cve | Deserialization of untrusted data in the agent portal of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code... |
9.8 | 2024-09-11 | CVE-2024-8692 | cve | A vulnerability classified as critical was found in TDuckCloud TDuckPro up to 6.3. Affected by this vulnerability is an unknown functionality. The manipulation leads to weak pas... |
9.8 | 2024-09-11 | CVE-2024-27112 | cve | A unauthenticated SQL Injection has been found in the SO Planning tool that occurs when the public view setting is enabled. An attacker could use this vulnerability to gain acce... |
Page(s) : 1 ... 105 106 107 108 109 110 111 112 113 114 [115] 116 117 118 119 120 121 122 123 124 125 ... | Result(s) : 43231 |